You are here

log

Infopackets Reader Steve T. writes: " Dear Dennis, I am use Acronis 2016 with Windows 10 to backup my system. Recently I tried to restore my C drive, but the backup failed in the middle of the restore operation. I subsequently tried 3 more backups I ... made earlier in the year but they also failed. This makes me think there is something wrong with the backup drive. I ended up having to reinstall Windows clean on my system to get back up and running. I tried running 'chkdsk' on the backup drive, and it reported that the volume bitmap was incorrect. I followed your guide on ' How to Fix: ChkDsk ... (view more)

Mirror Backup Mirror is portable backup program and is multi-threaded so it has little to no impact on system resources. Only files and folders that have been added/modified are copied, so disk writes are held to a minimum with the result being a ... much faster backup compared to traditional methods. http://topcat.hypermart.net Event Log Explorer Event Log Explorer is an effective software solution for viewing, monitoring and analyzing events recorded in Security, System, Application and other logs of Microsoft Windows NT / 2000 /XP / 2003 operating systems. Event Log Explorer greatly extends ... (view more)

Log On To Windows XP Automatically Tired of logging on twice? You boot up your computer, walk away expecting that all files and necessary programs will be loaded, only to return to a password screen? This program helps users bypass that step in ... order to log onto Windows XP automatically. http://www.downloadsquad.com Ramona This is an oddball program that simulates a conversation with a lovely brunette. It seems even a virtual person likes to chat; just answer Ramona's questions, and let the conversation flow from there. http://www.kurzweilai.net Today's fresh software picks were provided ... (view more)

Log Me In Hamachi LogMeIn Hamachi is a zero-configuration virtual private networking (VPN) application. Hamachi is a program that allows you to arrange multiple computers into their own secure network just as if they were connected by a physical ... network cable. Hamachi gives you LAN over the Internet. Virtually any application that works over local/home networks can also be used over Hamachi networks. Just think: Windows File Sharing, iTunes, Remote Desktop, Remote Assistance or even gaming -- all fully encrypted, authenticated and peer-to-peer. http://www.hamachi.cc/ Filseclab Personal ... (view more)

Total Uninstall is one of those "must-have" utilities for anyone who likes to download and install new applications on a regular basis. Case and point: The "Add/Remove" function in Control Panel (via Windows) is only as good as its uninstall log ... [hint: the uninstall log tells the "Add/Remove" function which files to uninstall]. Furthermore: an uninstall log is created by the a program once it's installed to the system ... and the program is created by a programmer. So, to put all together: an uninstall log is only as good as the programmer. If the programmer is forgetful and sloppy ... (view more)

Synopsis: Automate your backups today with Handy Backup! Backup data to virtually to any type of storage media -- even FTP servers or over a computer network. Special add-ons are provided to facilitate the backup of MS Outlook, system registry and ... ICQ files. Restoring is as easy as clicking a button, yet offers a number of options for advanced users. Handy Backup 4.0: See it in Action Click below to view a Macromedia Flash presentation of Handy Backup 4.0. If you do not have Flash installed to your browser, you will be prompted to install it. Handy Backup 4.0 Demo Handy Backup 4.0: Features ... (view more)

Infopackets Reader Glenda 'LadyInRed' writes: " Dear Dennis, Since I am not that tech-savvy when it comes to making changes on a computer system, I have decided to ask this question. I hope that you can give me an answer to it, then I can stop ... trying to figure it out on my own. I have a son that is 27 years old and he is very intelligent when it comes to the computer. He likes to get on my computer since I have a fast Internet connection (DSL), and downloads music using Kazaa. The problem is that every time that Kazaa is installed onto my computer it causes a lot of problems. I have ... (view more)

Since yesterday's article on Tracing the Origins of an Email Abuser through IP addresses, I have received two interesting comments from Readers. The first message comes a user named 'Luvaas', who writes: " Dear Dennis, I suspect that someone has ... accessed my online cell phone account and has snooped around my phone records. I have a pretty good idea who did it, but the phone company tells me that they have no way they can trace this individual. Any ideas? " Side note: IP address stands for Internet Protocol. All computers connected to the Internet have a unique IP address, which is ... (view more)